Skip to main content

About your Search

20121201
20121231
Search Results 0 to 2 of about 3 (some duplicates have been removed)
FOX News
Dec 27, 2012 10:00am PST
poorly ahead of the benghazi terror attack on 9/11 the state department told us last week they were all either gone or demoted. this is direct quote from spokeswoman victoria knew land. secretary clinton accepted eric boss equal's decision to resign as effective up immediately. the other three individuals have been relieved of their current duties. all four individuals have been placed on administrative leave pending further action. the "new york post" is reporting those folks are still on the state department payroll. eric boswell who they said resigned did not resign and all four will be back to work before too long. >> they just shifted the deck chairs and they want to make the american people believe that the state department has held people accountable for their lack of security and sending help to four brave americans. this is incredibly inept of the state department to think that it continue to fool the american public. pathetic. >> reporter: we've asked the state department about this and they have chosen so far not to clarify or deny any of it. keep in mind that right now, they
FOX News
Dec 6, 2012 10:00am PST
that's been appointed to review what happened in benghazi, libya, on 9/11 of this year, he is on an advisory board at the state department and one at the cia. so clearly, this man has got important matters on his desk. how exposed could we be if the chinese have access to all of his writings? >> very exposed. and this is nothing new. if you take a look at a typical burglar and he wants to break into a yard and has this hardened lock on a fence that he cannot cut through, what is he going to do? he's going to cut the chain. we're not going to go after a facility that spends billions of our tax dollars on securing their networks. we're going to go after somebody who works outside, somebody who has access to internal resources. it's called a u-turn attack. what they do is they find that weak link such as a home computer or a personal computer belonging to a former admiral or cia agent, and they attack that. they get access to that, and then they use their vpn connection inbound to get access to the same resources he would have access to or she would have access to based on the
Search Results 0 to 2 of about 3 (some duplicates have been removed)